Search results for: internet culture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4989

Search results for: internet culture

4719 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 113
4718 Kurma (Kerma Culture) at Nubia: Migration to Dholavira (Indus Valley Civilization)

Authors: Dhanpat Singh Dhania

Abstract:

Kurma-avatara and the Kachchhapraj is the name of the same person. Tortoise is called Kurma in Kerma valley (Nubia) and also called Kachchhap in India. Wherever a culture migrates, its faiths and beliefs remain intact. The tortoise culture of Kurma valley migrated to Dholavira, and its cultural symbolism remained the same as Kurma, the tortoise. Culture is known by burial traditions, pottery formations, language use, faiths, and beliefs. Following the cultural identification methodology, the Kurma culture buried their dead in circular burials found during excavation at Toshka, Nubia, and built their houses the type of tortoise shell. The Nubian tortoise of a specific species had a triangular on the shell found to be extinct was the cultural symbolism of the culture found on the excavated pottery. Kurma cultural head known as the Seth was known as Kurma-avatara. The Seth of Egypt came to know when the combined efforts of the Seth and the Osiris defeated the Egyptian 1st dynastic rule in about 2775 BCE. Osiris became the king of the 2nd dynastic Egypt. It annoyed Seth. He killed the Osiris and went to Rann of Kachchh and declared him as the Chachchhapraj, the king of Kachchh (now Gujarat, India). The Kurma (Kachchhap) culture migration at Dholavira (Gujarat) attested by the Dholavira signboard found during excavation and deciphered as the ‘Chakradhar’, the eighth incarnation of Kurma-avatara.

Keywords: Kurma, Egyptian, Kachchhap, Dholavira, Harappan

Procedia PDF Downloads 48
4717 Dominican Representation in Introductory Level Spanish Textbooks in the United States

Authors: Sheridan Wigginton

Abstract:

This research project investigates the representation of Dominicans and Dominican culture in nine widely-used Spanish textbooks in universities and colleges in the United States. The project uses the “culture” standard established by the American Council on the Teaching of Foreign Languages to examine the texts. The organization, commonly referred to by its acronym ACTFL, describes products as books, tools, foods, laws, music, and games; practices as patterns of social interactions; and perspectives as meanings, attitudes, values, and ideas. The content analysis of the texts will also specifically include visual analysis of the physical representation of the people depicted in Dominican-themed culture activities to more clearly integrate issues of color and national identity into the discussion.

Keywords: blackness, culture, Dominican republic, foreign language education, national identity, Spanish, textbooks

Procedia PDF Downloads 62
4716 Research on Internet Attention of Tourism and Marketing Strategy in Northeast Sichuan Economic Zone in China Based on Baidu Index

Authors: Chuanqiao Zheng, Wei Zeng, Haozhen Lin

Abstract:

As of March 2020, the number of Chinese netizens has reached 904 million. The proportion of Internet users accessing the Internet through mobile phones is as high as 99.3%. Under the background of 'Internet +', tourists have a stronger sense of independence in the choice of tourism destinations and tourism products. Tourists are more inclined to learn about the relevant information on tourism destinations and other tourists' evaluations of tourist products through the Internet. The search engine, as an integrated platform that contains a wealth of information, is highly valuable to the analysis of the characteristics of the Internet attention given to various tourism destinations, through big data mining and analysis. This article uses the Baidu Index as the data source, which is one of the products of Baidu Search. The Baidu Index is based on big data, which collects and shares the search results of a large number of Internet users on the Baidu search engine. The big data used in this article includes search index, demand map, population profile, etc. The main research methods used are: (1) based on the search index, analyzing the Internet attention given to the tourism in five cities in Northeast Sichuan at different times, so as to obtain the overall trend and individual characteristics of tourism development in the region; (2) based on the demand map and the population profile, analyzing the demographic characteristics and market positioning of the tourist groups in these cities to understand the characteristics and needs of the target groups; (3) correlating the Internet attention data with the permanent population of each province in China in the corresponding to construct the Boston matrix of the Internet attention rate of the Northeast Sichuan tourism, obtain the tourism target markets, and then propose development strategies for different markets. The study has found that: a) the Internet attention given to the tourism in the region can be categorized into tourist off-season and peak season; the Internet attention given to tourism in different cities is quite different. b) tourists look for information including tour guide information, ticket information, traffic information, weather information, and information on the competing tourism cities; with regard to the population profile, the main group of potential tourists searching for the keywords of tourism in the five prefecture-level cities in Northeast Sichuan are youth. The male to female ratio is about 6 to 4, with males being predominant. c) through the construction of the Boston matrix, it is concluded that the star market for tourism in the Northeast Sichuan Economic Zone includes Sichuan and Shaanxi; the cash cows market includes Hainan and Ningxia; the question market includes Jiangsu and Shanghai; the dog market includes Hubei and Jiangxi. The study concludes with the following planning strategies and recommendations: i) creating a diversified business format that integrates cultural and tourism; ii) creating a brand image of niche tourism; iii) focusing on the development of tourism products; iv) innovating composite three-dimensional marketing channels.

Keywords: Baidu Index, big data, internet attention, tourism

Procedia PDF Downloads 99
4715 Establishment and Improvement of Oil Palm Liquid Culture for Clonal Propagation

Authors: Mohd Naqiuddin Bin Husri, Siti Rahmah Abd Rahman, Dalilah Abu Bakar, Dayang Izawati Abang Masli, Meilina Ong Abdullah

Abstract:

A serious shortage of prime agricultural land coupled with environmental concerns inland expansion has daunted efforts to increase the national yield average. To address this issue, maximising yield per unit hectare through quality planting material is of great importance. Breeding for improved planting materials has been a continuous effort since the early days of this industry, it is time-consuming, and the likelihood of segregation within the progenies further impedes progress in this area. Incorporation of the cloning technology in oil palm breeding programmes is therefore advantageous to expedite the development of commercial elite and high-yielding planting materials. After more than 22 years of research and development through this project, reliable protocols for liquid/suspension culture systems coupled with various innovative technologies which are effective at promoting proliferation and growth of oil palm culture have been established. Subsequently, clonal palms derived from the suspension culture system were extensively studied in the field, and the results have been encouraging. Clones such as CPS1, CPS2 and a few others recorded superior performance in comparison with D x P standard crosses.

Keywords: tissue culture, suspension culture, oil palm, Elaeis guineensis

Procedia PDF Downloads 163
4714 Marketing and Commercial Activities Offered on Websites of European Union Banks

Authors: Mario Spremić, Natalija Kokolek, Božidar Jaković, Jurica Šimurina

Abstract:

This paper deals with various questions related to functionality and providing banking services in the European union on the Internet. Due to the fact that we live in the information technologies era, the Internet become a new space for doing economic and business activities in all areas, and especially important in banking. Accepting the busy tempo of life, in the past several years electronic banking has become necessity and a must for most users of banking services. On a sample of 300 web sites of the banks operating in European union (EU) we conduct the research on the functionality of e-banking services offered through banks web sites with the key objective to reveal to what extent the information technologies are used in their business operations. Characteristics of EU banks websites will be examined and compared to the basic groups of business activities on the web. Also some recommendations for the successful bank web sites will be provided.

Keywords: electronic banking, electronic business, European union banks, internet

Procedia PDF Downloads 440
4713 The Role of Organizational Culture, Organizational Commitment, and Styles of Transformational Leadership towards Employee Performance

Authors: Ahmad Badawi Saluy, Novawiguna Kemalasari

Abstract:

This study aims to examine and analyze the influence of organizational culture, organizational commitment, and transformational leadership style on employee performance. This study used descriptive survey method with quantitative approach, and questionnaires as a tool used for basic data collection. The sampling technique used is proportionate stratified random sampling technique; all respondents in this study were 70 respondents. The analytical method used in this research is multiple linear regressions. The result of determination coefficient of 52.3% indicates that organizational culture, organizational commitment, and transformational leadership style simultaneously have a significant influence on the performance of employees, while the remaining 47.7% is explained by other factors outside the research variables. Partially, organization culture has strong and positive influence on employee performance, organizational commitment has a moderate and positive effect on employee performance, while the transformational leadership style has a strong and positive influence on employee performance and this is also the variable that has the most impact on employee performance.

Keywords: organizational culture, organizational commitment, transformational leadership style, employee performance

Procedia PDF Downloads 187
4712 One-Stop Culture Workshop Concept as a Way to Raise the Potential of Indonesia Culture in AEC 2015: Case Study in Saung Angklung Udjo

Authors: Meiliana, Achmad Eko Prabowo, Muhammad Fathan Mubina

Abstract:

AFTA agreement in 2015 will bring a significant impact on Indonesian society. Indonesia’s people will face competition both in the economic, political, and cultural regionally among ten countries in ASEAN. Indonesia is a rich country in culture and has a large enough demographic bonus when compared to other ASEAN countries. Indonesia also has a lot of cultural enrichment in every its region. It’s mean, the role of society and culture of Indonesia's abundant if combined properly it will help Indonesia in the face of the ASEAN Economic Community (AEC) in 2015. This paper will discuss the role of one-stop culture workshop (OSCW) concept at Saung Angklung Udjo (SAU), a cultural tourist area of Angklung which is located in Bandung. OSCW is a concept that implemented a cultural tour in SAU that invites the visitor to engage in the cultural empowerment. In this research, we will answer how the concepts are applied by SAU can be an alternative to re-discover the potential of Indonesia in the face of the AEC 2015. Units of analysis that we used is among the programs, outcomes, and community empowerment. This study used a qualitative approach with in-depth interviews and observation. The finding of this study prove that OSCW concept is an opportunity for Indonesia to encourage a culture to go international. The concept of OSCW can really be used other communities to develop cultures of Indonesia so that later institutionalized culture that not only can be used as a tourist attraction but also as an educational laboratory for the community.

Keywords: OSCW concept, citizen empowerment, cultural tour, AEC 2015

Procedia PDF Downloads 442
4711 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit

Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana

Abstract:

Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.

Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification

Procedia PDF Downloads 125
4710 The Role of Community Museum in Ethnic Identity: A Case of Tharu Cultural Museum and Research Center in Chitwan Nepal

Authors: Birendra Mahato, Shiva Narayan Chaudhary

Abstract:

Tharus are indigenous inhabitants of the Tarai, the narrow strip of flat and fertile land that lies at the foothills of the Himalayas. They have unique rituals, festivals, and music, while their clothes and ornaments are similar to some ethnic groups of India. After the control of malaria in the Terai between 1955 to 1965, (with the help of the U.S. Government, the WHO and the government of Nepal) the rate of in-migration skyrocketed, particularly of Nepal’s hill people, whose culture, along with the use of the Western education system, was gradually adopted by the Tharus. Among the many challenges, the Tharus face is their assimilation into the dominant Nepali culture. .The Tharus are thus under threat of slowly losing their ethnic identity and cultural values. In order to preserve the indigenous Tharu Culture, Tharu Cultural Museum, and Research Center. It is a community based non-governmental and non-profitable museum established in 2005 by Tharu intellectuals, traditional leaders and youths. The main goal of the museum is to preserve Tharu culture through different activities with direct and indirect involvement of community people. It aims to preserve arts, culture, handicrafts, and artifacts related to Indigenous Tharu People. Similarly, the museum displays an exhibition about the Tharu histories, lives, culture, and their indigenous knowledge and skills. The paper aims to demonstrate that community museums can be one of the key hubs for the preservation of culture with the collection and promotion of cultural objects, artifacts, and intangible cultural heritages. The preservation of culture not only has contributed to establishing their ethnic identity but also has contributed to establishing their recognition of their political space in the mainstream politics - the constitution of Nepal has recognized Tharus to provide reservation for the political space.

Keywords: community museum, tharu, , identity, culture

Procedia PDF Downloads 111
4709 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry

Authors: Marvin Ricardo Awarab

Abstract:

There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.

Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G

Procedia PDF Downloads 33
4708 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 326
4707 The Study of Information Uses Behaviour of Tourists in Songkhla Province, Thailand

Authors: Patraporn Kaewkhanitarak, Suchada Srichuar, Narawat Kanjanapan

Abstract:

This research is the survey research. The purpose of this research is to study information uses behavior and problem of tourists in Songkhla Province. The tool used in this study include structure questioner standardize in 5 levels rating scale. The 400 participants selected by convenience sampling (allowable error 5%) by Taro Yamane method. The collecting data period is 6 months from January-June 2014. The result of this study found that the type of information that the tourists often use to plan their trip is internet (x̅ = 3.81) and the most popular text is restaurant (x̅ = 3.77). The tourists found that booking or buying service from internet provided more affordable price and they could select appropriate plan by themselves. The most convenience source of information that the tourists often use is internet and website (x̅ = 3.69). Nevertheless, they explained that most of tourist information source in Songkhla province are lack and insufficient of tourist organization that provide information and service related to tourism.

Keywords: information, behavior, tourists, Thailand

Procedia PDF Downloads 225
4706 The Promotion of a Risk Culture: a Descriptive Study of Ghanaian Banks

Authors: Gerhard Grebe, Johan Marx

Abstract:

The aim of the study is to assess the state of operational risk management and the adoption of an appropriate risk culture in Ghanaian banks. The Bank of Ghana (BoG) joined the Basel Consultative Group (BCG) of the Basel Committee on Bank Supervision (BCBS) in 2021 and is proceeding with the implementation of the Basel III international regulatory framework for banks. The BoG’s Directive about risk management encourages, inter alia, the creation of an appropriate risk culture by Ghanaian banks. However, it is not evident how the risk management staff of Ghanaian banks experience the risk culture and the implementation of operational risk management in the banks where they are employed. Ghana is a developing economy, and it is addressing challenges with its organisational culture. According to Transparency International, successive Ghanaian governments claim to be fighting corruption, but little success has been achieved so far. This points to a possible lack of accountability, transparency, and integrity in the environment in which Ghanaian banks operate and which could influence their risk culture negatively. Purposive sampling was used for the survey, and the questionnaire was completed byGhanaian bank personnel who specializesin operational risk management, risk governance, and compliance, bank supervision, risk analyses, as well as the implementation of the operational risk management requirements of the Basel regulatory frameworks. The respondents indicated that they are fostering a risk culture and implementing monitoring and reporting procedures; the three lines of defence (3LOD); compliance; internal auditing; disclosure of operational risk information; and receiving guidance from the bank supervisor in an attempt to improve their operational risk management practices. However, the respondents reported the following challenges with staff members who are not inside the risk management departments(in order of priority), namelydemonstrating a risk culture, training and development; communication; reporting and disclosure; roles and responsibilities; performance appraisal; and technological and environmental barriers. Recommendations to address these challenges are provided

Keywords: ghana, operational risk, risk culture, risk management

Procedia PDF Downloads 84
4705 Laser Based Microfabrication of a Microheater Chip for Cell Culture

Authors: Daniel Nieto, Ramiro Couceiro

Abstract:

Microfluidic chips have demonstrated their significant application potentials in microbiological processing and chemical reactions, with the goal of developing monolithic and compact chip-sized multifunctional systems. Heat generation and thermal control are critical in some of the biochemical processes. The paper presents a laser direct-write technique for rapid prototyping and manufacturing of microheater chips and its applicability for perfusion cell culture outside a cell incubator. The aim of the microheater is to take the role of conventional incubators for cell culture for facilitating microscopic observation or other online monitoring activities during cell culture and provides portability of cell culture operation. Microheaters (5 mm × 5 mm) have been successfully fabricated on soda-lime glass substrates covered with aluminum layer of thickness 120 nm. Experimental results show that the microheaters exhibit good performance in temperature rise and decay characteristics, with localized heating at targeted spatial domains. These microheaters were suitable for a maximum long-term operation temperature of 120ºC and validated for long-time operation at 37ºC. for 24 hours. Results demonstrated that the physiology of the cultured SW480 adenocarcinoma of the colon cell line on the developed microheater chip was consistent with that of an incubator.

Keywords: laser microfabrication, microheater, bioengineering, cell culture

Procedia PDF Downloads 265
4704 Domestic Led Lighting Designs Using Internet of Things

Authors: Gouresh Singhal, Rajib Kumar Panigrahi

Abstract:

In this paper, we try to examine historical and technological changes in lighting industry. We propose a (proto) technical solution at block diagram and circuit level. Untapped and upcoming technologies such as Cloud and 6LoWPAN are further explored. The paper presents a robust hardware realistic design. A mobile application is also provided to provide last mile user interface. The paper highlights the current challenges to be faced and concludes with a pragmatic view of lighting industry.

Keywords: 6lowpan, internet of things, mobile application, led

Procedia PDF Downloads 549
4703 Examination of Relationship between Internet Addiction and Cyber Bullying in Adolescents

Authors: Adem Peker, Yüksel Eroğlu, İsmail Ay

Abstract:

As the information and communication technologies have become embedded in everyday life of adolescents, both their possible benefits and risks to adolescents are being identified. The information and communication technologies provide opportunities for adolescents to connect with peers and to access to information. However, as with other social connections, users of information and communication devices have the potential to meet and interact with in harmful ways. One emerging example of such interaction is cyber bullying. Cyber bullying occurs when someone uses the information and communication technologies to harass or embarrass another person. Cyber bullying can take the form of malicious text messages and e-mails, spreading rumours, and excluding people from online groups. Cyber bullying has been linked to psychological problems for cyber bullies and victims. Therefore, it is important to determine how internet addiction contributes to cyber bullying. Building on this question, this study takes a closer look at the relationship between internet addiction and cyber bullying. For this purpose, in this study, based on descriptive relational model, it was hypothesized that loss of control, excessive desire to stay online, and negativity in social relationships, which are dimensions of internet addiction, would be associated positively with cyber bullying and victimization. Participants were 383 high school students (176 girls and 207 boys; mean age, 15.7 years). Internet addiction was measured by using Internet Addiction Scale. The Cyber Victim and Bullying Scale was utilized to measure cyber bullying and victimization. The scales were administered to the students in groups in the classrooms. In this study, stepwise regression analyses were utilized to examine the relationships between dimensions of internet addiction and cyber bullying and victimization. Before applying stepwise regression analysis, assumptions of regression were verified. According to stepwise regression analysis, cyber bullying was predicted by loss of control (β=.26, p<.001) and negativity in social relationships (β=.13, p<.001). These variables accounted for 9 % of the total variance, with the loss of control explaining the higher percentage (8 %). On the other hand, cyber victimization was predicted by loss of control (β=.19, p<.001) and negativity in social relationships (β=.12, p<.001). These variables altogether accounted for 8 % of the variance in cyber victimization, with the best predictor loss of control (7 % of the total variance). The results of this study demonstrated that, as expected, loss of control and negativity in social relationships predicted cyber bullying and victimization positively. However, excessive desire to stay online did not emerge a significant predictor of both cyberbullying and victimization. Consequently, this study would enhance our understanding of the predictors of cyber bullying and victimization since the results proposed that internet addiction is related with cyber bullying and victimization.

Keywords: cyber bullying, internet addiction, adolescents, regression

Procedia PDF Downloads 289
4702 The Internet of Healthcare Things: A European Perspective and a Review of Ethical Concerns

Authors: M. Emmanouilidou

Abstract:

The Internet of Things (IoT) is a disruptive technological paradigm that is at the center of the digital evolution by integrating physical and virtual worlds leading to the creation of extended interconnected ecosystems that are characterized as smart environments. The concept of the IoT has a broad range of applications in different industries including the healthcare sector. The Internet of Healthcare Things (IoHT), a branch of the IoT, is expected to bring promising benefits to all involved stakeholders and accelerate the revolution of the healthcare sector through a transition towards preventive and personalized medicine. The socio-economic challenges that the healthcare sector is facing further emphasize the need for a radical transformation of healthcare systems in both developed and developing countries with the role of pervasive technological innovations, such as IoHT, recognized as key to counteract the relevant challenges. Besides the number of potential opportunities that IoHT presents, there are fundamental ethical concerns that need to be considered and addressed in relation to the application of IoHT. This paper contributes to the discussion of the emerging topic of IoHT by providing an overview of the role and potential of IoHT, highlighting the characteristics of the current and future healthcare landscape, reporting on the up-to-date status of IoHT in Europe and reflecting upon existing research in the ethics of IoHT by incorporating additional ethical dimensions that have been ignored which can provide pathways for future research in the field.

Keywords: ethics, Europe, healthcare, Internet of Things

Procedia PDF Downloads 106
4701 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain

Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani

Abstract:

The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.

Keywords: blockchain, hyperledger fabric, internet of things, security, traceability

Procedia PDF Downloads 113
4700 Effectiveness of Internet Psychological Counseling in Reducing Social Shyness Symptoms among Students of University of Tabuk

Authors: Khawla Saad Albalawi

Abstract:

The aim of this research was to explore the effectiveness of the internet counseling in reducing social shyness among the university's students. The sample consisted of 40 students and was divided into two groups: an experimental group and a control group. The social shyness scale (SSS) was administered to both groups before applying the counseling to the experimental group (as a pre-test). After that, the internet counseling was applied to the experimental group. Next, the SSS was administered to both groups (as a post-test). Finally, the SSS was administered to the experimental group (as an iterative application). Results suggest that: 1. There is a significant difference between the two groups in the post-test in all dimensions and the total score of the (SSS) in favor of the experimental group in all cases. 2. There is a significant difference between the pre- and the post-test of the experimental group in all dimensions and the total score of the (SSS) in favor of the post-test in all cases. 3. There is no significant difference between the post-test and the iterative application of the experimental group in all dimensions and the total score of the (SSS). The above results were discussed in light of previous research. Recommendations and future researches were suggested.

Keywords: internet psychological clinics, social interaction disorders, shyness, Twitter, Facebook

Procedia PDF Downloads 468
4699 Polish Operational Plans During Cold War as Part of Warsaw Pact Strategic Culture

Authors: Wiktor Stypczyński

Abstract:

During the Cold War, both sides of the conflict developed advanced operational plans in case of a Third World War outbreak. In the Warsaw Pact, Soviet generals in Moscow chose targets for each army, but each country's General Staff had to create specific plans for their nation. This led to the creation of a Strategic Culture within the Warsaw Pact that was reflected in the plans of each army. This paper aims to showcase the Strategic Culture of the Warsaw Pact by using the plans of the People's Polish Army as an example. Examining one army at a time will allow for a more detailed and unique perspective on the matter. Understanding the past Strategic Culture is crucial in comprehending the current post-Soviet strategic situation in Eastern Europe, especially with the current situation in Ukraine. This paper is based on Benon Miśkiewicz's classic methodology of military history. While this methodology is the foundation, the research findings will also draw on the Strategic Studies methodology and the accomplishments of war and military science. Additionally, the Security and Political Studies methodology will be a crucial element in constructing the narrative.

Keywords: cold war, operetional plans, strategic culture, polish people's army

Procedia PDF Downloads 41
4698 Reforming Traditional and Cultural Practices in Nigeria for Enhancement and Sustainable Development in the 21st Century: A Case Study of the Jukun People

Authors: Iliya Ibrahim Gimba

Abstract:

Human beings or groups over the world have a traditional and cultural practices which guide and direct their ways of life. They value and promote these practices not minding the attitude of others towards them. In spite of the place of culture which is an embodiment of these practices in every human society some people still reduce the understanding of culture to idolatry and other archaic and anachronistic arts good perhaps only for the museum. Others consider culture to be just drumming and dancing. Whether a culture is “good” or “bad”, civilized or barbaric, it can be reformed for the betterment of the society. Hence, this paper focuses on reforming traditional and cultural practices in Nigeria for enhancing development in the 21st century using the Jukun people as a case study. Relevant literatures from journals, reports, published books among others will be consulted.

Keywords: Jukun, traditional and cultural practices, sustainable development, human

Procedia PDF Downloads 393
4697 Mariculture Trials of the Philippine Blue Sponge Xestospongia sp.

Authors: Clairecynth Yu, Geminne Manzano

Abstract:

The mariculture potential of the Philippine blue sponge, Xestospongia sp. was assessed through the pilot sponge culture in the open-sea at two different biogeographic regions in the Philippines. Thirty explants were randomly allocated for the Puerto Galera, Oriental Mindoro culture setup and the other nine were transported to Lucero, Bolinao, Pangasinan. Two different sponge culture methods of the sponge explants- the lantern and the wall method, were employed to assess the production of the Renieramycin M. Both methods have shown to be effective in growing the sponge explants and that the Thin Layer Chromatography (TLC) results have shown that Renieramycin M is present on the sponges. The effect of partial harvesting in the growth and survival rates of the blue sponge in the Puerto Galera setup was also determined. Results showed that a higher growth rate was observed on the partially harvested explants on both culture methods as compared to the unharvested explants.

Keywords: chemical ecology, porifera, sponge, Xestospongia sp.

Procedia PDF Downloads 250
4696 Generation Y Leaders in Radiology Nursing - Changing the Culture by Understanding the Challenges of a Multi-Generational Workforce

Authors: Amie Smith, Jodi-Lyn Benjamin

Abstract:

In 2020, there are currently four generations in the nursing workforce: The Veterans, Boomers, Generation X and Generation Y (Gen Y). Understanding each generation and their growing needs will equip the workforce for when the Boomers prepare for retirement, with majority of nursing leadership positions to be potentially replaced with Gen Y nurses. In SA Medical Imaging(SAMI), at Flinders Medical Centre (FMC), it has been proven that despite challenges in succession planning, Gen Y nurse leaders are able to overcome these obstacles and provide the leadership necessary to meet the changing needs in healthcare and across organisations. Changing the culture in radiology nursing has been seen as an obstacle due to the historical nursing practices and resistance to adapt to current/future practice. As radiology advances so does the role of the nurse in imaging, this has required resilience and strong support through leadership as we change and develop the culture to keep up with the evolution of technology and standard of patient care. As a result of supporting Gen Y nurses in leadership roles, SAMI, FMC has seen a positive change in culture by creating a healthy work environment which has allowed Gen Y nurses to make long lasting contributions to the nursing profession.

Keywords: changing culture, Generation Y, radiology, nursing, leadership

Procedia PDF Downloads 109
4695 The Socio-Religious, Economic, and Cultural Impacts of Aso-Ebi on South-East Nigeria

Authors: Nwaoga, Theresa Chinyere

Abstract:

The paper examines the impacts of Aso-Ebi, a Yoruba term for ‘uniform’ on the people of south-east Nigeria. Aso-Ebi is used to denote uniform wear which is typical of the people of south-west Nigeria. In the 1980s and 1990s, uniform wears were used only by immediate family members of a deceased person. This is for easy identification by visitors—to know those who are related to the deceased person. Aso-Ebi is now part of a culture that has existed in Nigeria from the Yoruba and transcended to other parts of Nigeria, precisely south-east Nigeria. The buying of Aso-Ebi and attending the occasions in the attire is the only way of showing solidarity and support to the celebrant. Aso-Ebi has led to creating a sense of belonging, opening of doors for marriage by those single, and fundraising. As part of the findings, it was discovered that Aso-Ebi has led to an increase in marital infidelity and divorce, robbery, prostitution, depression, and an increase in enmity between friends in south-east Nigeria. Data was generated through oral interviews, focus group discussion and participant observation. Secondary data were obtained from journals, textbooks, the internet and periodicals. The phenomenological method of research was used as the methodology. This method allows for an objective report and analysis of the research problem. Aso-Ebi has come to stay in Igbo culture, so there should be a proper re-orientation on the uses of Aso-Ebi during occasions like burial in Igbo land. The campaign can start from the church by discouraging people from using Aso-Ebi during burials and wedding ceremonies.

Keywords: Asho Ebi, uniformed women, burial ceremonies, August meetings

Procedia PDF Downloads 108
4694 Comparison of Bactec plus Blood Culture Media to BacT/Alert FAN plus Blood Culture Media for Identification of Bacterial Pathogens in Clinical Samples Containing Antibiotics

Authors: Recep Kesli, Huseyin Bilgin, Ela Tasdogan, Ercan Kurtipek

Abstract:

Aim: The aim of this study was to compare resin based Bactec plus aerobic/anaerobic blood culture bottles (Becton Dickinson, MD, USA) and polymeric beads based BacT/Alert FA/FN plus blood culture bottles (bioMerieux, NC, USA) in terms of microorganisms recovery rates and time to detection (TTD) in the patients receiving antibiotic treatment. Method: Blood culture samples were taken from the patients who admitted to the intensive care unit and received antibiotic treatment. Forty milliliters of blood from patients were equally distributed into four types of bottles: Bactec Plus aerobic, Bactec Plus anaerobic, BacT/Alert FA Plus, BacT/Alert FN Plus. Bactec Plus and BacT/Alert Plus media were compared to culture recovery rates and TTD. Results: Blood culture samples were collected from 382 patients hospitalized in the intensive care unit and 245 patients who were diagnosed as having bloodstream infections were included in the study. A total of 1528 Bactec Plus aerobic, Bactec Plus anaerobic, BacT/Alert FA Plus, BacT/Alert FN Plus blood culture bottles analyzed and 176, 144, 154, 126 bacteria or fungi were isolated, respectively. Gram-negative and gram-positive bacteria were significantly more frequently isolated in the resin-based Bactec Plus bottles than in the polymeric beads based BacT/Alert Plus bottles. The Bactec Plus and BacT/Alert Plus media recovery rates were similar for fungi and anaerobic bacteria. The mean TTDs in the Bactec Plus bottles were shorter than those in the BacT/Alert Plus bottles regardless of the microorganisms. Conclusion: The results of this study showed that resin-containing media is a reliable and time-saving tool for patients who are receiving antibiotic treatment due to sepsis in the intensive care unit.

Keywords: Bactec Plus, BacT/Alert Plus, blood culture, antibiotic

Procedia PDF Downloads 120
4693 Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity

Authors: Wang, Kuei-Ing, Jou-Fan Shih

Abstract:

This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.

Keywords: seductive properties of internet, online disinhibition, punishment certainty, punishment severity, social identity

Procedia PDF Downloads 484
4692 Evaluation of Diagnostic Values of Culture, Rapid Urease Test, and Histopathology in the Diagnosis of Helicobacter pylori Infection and in vitro Effects of Various Antimicrobials against Helicobacter pylori

Authors: Recep Kesli, Huseyin Bilgin, Yasar Unlu, Gokhan Gungor

Abstract:

Aim: The aim of this study, was to investigate the presence of Helicobacter pylori (H. pylori) infection by culture, histology, and RUT (Rapid Urease Test) in gastric antrum biopsy samples taken from patients presented with dyspeptic complaints and to determine resistance rates of amoxicillin, clarithromycin, levofloxacin and metronidazole against the H. pylori strains by E-test. Material and Methods: A total of 278 patients who admitted to Konya Education and Research Hospital Department of Gastroenterology with dyspeptic complaints, between January 2011-July 2013, were included in the study. Microbiological and histopathological examinations of biopsy specimens taken from antrum and corpus regions were performed. The presence of H. pylori in biopsy samples was investigated by culture (Portagerm pylori-PORT PYL, Pylori agar-PYL, GENbox microaer, bioMerieux, France), histology (Giemsa, Hematoxylin and Eosin staining), and RUT(CLOtest, Cimberly-Clark, USA). Antimicrobial resistance of isolates against amoxicillin, clarithromycin, levofloxacin, and metronidazole was determined by E-test method (bioMerieux, France). As a gold standard in the diagnosis of H. pylori; it was accepted that the culture method alone was positive or both histology and RUT were positive together. Sensitivity and specificity for histology and RUT were calculated by taking the culture as a gold standard. Sensitivity and specificity for culture were also calculated by taking the co-positivity of both histology and RUT as a gold standard. Results: H. pylori was detected in 140 of 278 of patients with culture and 174 of 278 of patients with histology in the study. H. pylori positivity was also found in 191 patients with RUT. According to the gold standard criteria, a false negative result was found in 39 cases by culture method, 17 cases by histology, and 8 cases by RUT. Sensitivity and specificity of the culture, histology, and RUT methods of the patients were 76.5 % and 88.3 %, 87.8 % and 63 %, 94.2 % and 57.2 %, respectively. Antibiotic resistance was investigated by E-test in 140 H. pylori strains isolated from culture. The resistance rates of H. pylori strains to the amoxicillin, clarithromycin, levofloxacin, and metronidazole was detected as 9 (6.4 %), 22 (15.7 %), 17 (12.1 %), 57 (40.7 %), respectively. Conclusion: In our study, RUT was found to be the most sensitive, culture was the most specific test between culture, histology, and RUT methods. Although we detected the specificity of the culture method as high, its sensitivity was found to be quite low compared to other methods. The low sensitivity of H. pylori culture may be caused by the factors affect the chances of direct isolation such as spoild bacterium, difficult-to-breed microorganism, clinical sample retrieval, and transport conditions.

Keywords: antimicrobial resistance, culture, histology, H. pylori, RUT

Procedia PDF Downloads 141
4691 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 309
4690 High Culture or Low Culture: The Propagation and Popularization of the Classic of Poetry in Modern China

Authors: Fang Tang

Abstract:

A major Confucian masterpiece and the earliest-known poetry anthology (composed approximately 1046-771 BCE), The Classic of Poetry, reflects different cultures in ancient China. It is regarded as a Chinese classic and one of the world’s most significant written works, an essential part of our global cultural heritage. This paper explores how the ancient Chinese classic became transformed into part of popular culture, found in folk songs circulated in Fangxian county, a mountainous location in Hubei province in central mainland China. It is the hometown of one of the most well-known authors of The Classic of Poetry, whose name is Yin Jifu. Local villagers process, refine, and recreate these poems into popular folk songs, which have been handed down from generation to generation. The folk songs based on The Classic of Poetry vividly reflect local customs, life styles, and various cultural activities. After thousands of years of singing these traditional songs, the region has become an important area to maintain part of Chinese cultural heritages; here, the original high culture is converted into a popular culture that is absorbed into people’s daily life. Based on a year’s field research and many interviews with local singers, this paper explores the ways in which locals have transformed the contents of The Classic of Poetry. It examines how today these popular folk songs become part of much-treasured culture heritage, illustrating the transformation of traditional high culture into popular culture. The paper argues that the modern adaptations of the traditional poems of The Classic of Poetry combine both oral and written cultural heritage and reflects the interaction between ancient Chinese official literature and folk literature. The paper also explores the reasons why the folk songs of The Classic of Poetry are so popular in the area, including the influences of its author Yin Jifu, the impact of ancient diasporic culture from the political centre to remote rural areas, and the interactions of local cultures (famous as Chu culture) and Chinese mainstream cultural policies.

Keywords: high/low culture, The Classic of Poetry, the functions of media, cultural policy

Procedia PDF Downloads 81